0% found this document useful (0 votes)
89 views62 pages

CheckPoint 2015 SecurityReport English

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views62 pages

CheckPoint 2015 SecurityReport English

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

2015

SECURITY
REPORT
CHECK POINT
2015 SECURITY REPORT

01 INTRODUCTION AND METHODOLOGY 04

02 UNKNOWN MALWARE: THE VAST UNKNOWN 10

03 KNOWN MALWARE: KNOWN AND DANGEROUS 18

04 MOBILE SECURITY: DON’T FENCE ME IN 32

05 APPLICATIONS: GETTING YOU WHERE IT HURTS 40

06 DATA LOSS: LIKE SAND THROUGH THE HOUR GLASS 48

07 CONCLUSION AND RECOMMENDATIONS: 56


THE PATH TO PROTECTION

REFERENCES 60

CHECK POINT - 2015 SECURITY REPORT | 3


01
INTRODUCTION
AND METHODOLOGY

“The first time you do something, it’s science. The


second time you do something, it’s engineering.” 1
–Clifford Stoll, astronomer, author, digital forensics pioneer

CHECK POINT - 2015AND


INTRODUCTION SECURITY REPORT | 4
METHODOLOGY
THE EVOLUTION OF MALWARE
THE SECURITY LANDSCAPE | ACCELERATION OF OF MALWARE

25 YEARS AGO 20 YEARS AGO 15 YEARS AGO 10 YEARS AGO 5 YEARS AGO NOW
Invention of Invention of Prevalent Use URL Filtering, NGFW Threat Intelligence,
Firewall Stateful of Anti-Virus, UTM Threat Prevention,
Inspection VPN, IPS Mobile Security

>
1988 1994 1998 2003 2006 2010 2014 2020
Morris Worm Green Card Lottery Melissa Anonymous WikiLeaks DDoS Bitcoin IoT Everywhere
Formed Attacks:
Stuxnet
SCADA

2000 2007 2013 2017


I Love You Zeus Trojan Dragonfly Driverless Cars
Hacked?
2011
Stolen
Authentication 2012
Information Flame Malware

In science, it’s all about discovery—studying cause other mobile devices might not be tools, per se, but
and effect. Once something is understood and can be they can be hijacked to give hackers the ability to
predicted, it then becomes a process of engineering, penetrate corporate networks.
to replicate. In the world of cyber threats, it’s the
same. Cyber criminals are studying structures During 2014, Check Point saw significant
and thinking through how certain factors can spur exploits of vulnerabilities in open source software,
desired outcomes. Once they have a predictive as well as in common applications by Adobe
model, they set about engineering how to unleash and Microsoft.
what they’ve designed, for the greatest effect.
Known malware remained steady, continuing to
What are their tools? be pervasive and inflicting damage. But with the
1. Malware—malicious software code that hackers creation of signatures to help identify, filter, and
develop to either create disruption or to steal block subsequent deployment attempts of known
data. When malware becomes known, signatures malware, the focus among hackers changed. They
are created to help identify, filter, and block it in looked to something easier and more rewarding:
subsequent deployment attempts. And that’s when launching new attacks with unknown malware by
they turn to tampering with the code to create fresh slightly modifying what already existed—enabling
unknown malware. it to evade detection. It’s this area—unknown
2. Vulnerabilities—defects in software or operating malware—that exploded and caught most people’s
systems that hackers seek to exploit, which exist in attention during 2014. Launching at unprecedented
almost all applications. rates, new malware seemed to have a singular
3. Mobile Devices—smartphones, Fitbits, iPads, and purpose: stealing data.

INTRODUCTION AND METHODOLOGY | 5


AN AVERAGE DAY
AT AN ENTERPRISE ORGANIZATION

EVERY 24 SECONDS
a host accesses a malicious website

EVERY 34 SECONDS
an unknown malware is downloaded

EVERY 1 MINUTE
a bot communicates with its
command and control center

EVERY 5 MINUTES
a high-risk application is used

EVERY 6 MINUTES
a known malware is downloaded

EVERY 36 MINUTES
sensitive data are sent
outside the organization

1.1 SOURCE: Check Point Software Technologies


INTRODUCTION AND METHODOLOGY | 6
“The first computer viruses hit computers in the early 1980s, and essentially we’ve
been in a cyber arms race ever since. We design new defenses, and then hackers
and criminals design new ways to penetrate them….We’ve got to be just as fast
and flexible and nimble in constantly evolving our defenses.” 2
-President Barack Obama

Contributing to the problem: cultural shifts. Between the frequency of the breaches and
Mobility, virtualization and other new technologies the high profiles of the businesses targeted,
have changed the way we work. And in the 2014 sent all organizations a clear message:
process, businesses have rushed to adopt Everyone is at risk.
these tools to boost productivity and efficiency.
But they’ve done so without considering the And when world leaders choose to focus on
security implications. While they are quite focused cyber security as they address their nations,
on stability and uptime, they don’t realize that it seems clear that cybercrime has reached a
better-secured environments have higher uptimes. critical point.

METHODOLOGY

During 2014, Check Point collected event data from ThreatCloud®, which is connected to security
three different sources around the world to shine a gateways of more than 16,000 organizations.
light on security trends, and identify issues that are 3. From more than 3,000 gateways connected to
on the rise or, in some cases, in decline. our ThreatCloud Emulation Services.

Sources of Check Point Research: What did we look at?


1. From security events found during more than Unknown Malware
1,300 organizations’ Security Checkups. 3
This Known Malware
information hailed from businesses from all Intrusion Prevention
industries around the globe. High-Risk Applications
2. From events discovered through Check Point Data Loss Incidents

Almost every organization


that was studied experienced
attacks due to high-risk
81%
of the organizations sampled
had suffered a data
applications loss incident

INTRODUCTION AND METHODOLOGY | 7


CHECK POINT RESEARCH CROSSED ALL INDUSTRIES

46

Looking at the vertical markets that participated


in our research, manufacturing led the way at 46
percent, with representation across the board by
finance, government, retail and wholesale,
telco, and consulting.
PERCENT OF ORGANIZATIONS BY INDUSTRY

17
15
12

4 3 2

MANUFACTURING FINANCE GOVERNMENT RETAIL AND TELCO CONSULTING OTHER


WHOLESALE

1.2 SOURCE: Check Point Software Technologies


INTRODUCTION AND METHODOLOGY | 8
Security Statistics in 2014

• New malware increased 71%.4


• 106 downloads of unknown malware occurred per hour.
• 86% of organizations accessed a malicious site.
• 83% of organizations had existing bot infections.
• 42% of businesses suffered mobile security incidents costing
more than $250,000 to remediate.
• 96% of organizations used at least one high-risk application.
• 81% of organizations suffered a data loss incident.
• Loss of proprietary information increased 71% over the
past three years.

In the following pages, Check Point reveals the security and business leaders understand the
findings of our in-depth analysis of security threats threat landscape and how to create the strongest
and trends uncovered in 2014. Our aim is to help security posture possible.

“Hackers don’t take realities of the world for granted;


they seek to break and rebuild what they don’t like.
They seek to outsmart the world.” 5
-Sarah Lacy, journalist and author

INTRODUCTION AND METHODOLOGY | 9


02
UNKNOWN MALWARE:
THE VAST UNKNOWN

“There’s always the risk that there are


unknown unknowns.” 6
–Nate Silver, statistician, journalist

10 | INTRODUCTION AND METHODOLOGY CHECK POINT - 2015AND


INTRODUCTION SECURITY REPORT | 10
METHODOLOGY
106 unknown malware hit an
organization every hour

Unknown malware is malware typically not organizations downloaded at least one infected
recognized or known by anti-virus systems. Each file with unknown malware—almost a 25 percent
new unknown malware variant, even if it only increase from the previous year.
has minor alterations, is potentially capable of
bypassing the most current anti-virus and virtual Worse is the speed at which this is occurring.
sandbox protections. Check Point’s research showed that on a daily
basis, 106 unknown malware downloads were
While we saw an explosion of unknown malware occurring per hour. That staggering figure is 48
last year, it was merely the tip of the iceberg, times bigger than last year’s mere 2.2 downloads
when viewed through today’s lens. Now, the rate of per hour.
zero-day and unknown malware is massive. From
2013 to 2014, new malware jumped just over 71 Incredibly, only one percent of enterprises use
percent from 83M to 142M, according to AV-Test, technologies to prevent zero-day attacks. And,
an independent service provider of anti-virus only one tenth of enterprises consume threat
research. And, more malware was found in the past intelligence services. Looking at the volume of
two years than in the previous 10 years combined. unknown malware that was downloaded, 52 percent
of infected files were PDFs, while 3 percent were
During 2014, Check Point analyzed more than Office files.
3,000 gateways and found that 41 percent of

UNKNOWN MALWARE: THE VAST UNKNOWN | 11


142M 2014

83M 2013

34M 2012

142M
18.5M 2011

2010
18M
NEW MALWARE IN 2014 AND A
71% INCREASE VERSUS 2013
12M 2009

2.1 SOURCE: AV-Test

How Bad Is it, Really?


It’s bad. Without a recognized malware signature to to test the speed and catch rate at which malware
catch, the typical preventive tools can’t do their job. could be blocked. To turn the known into unknown
The new face of malware is fast and stealthy thanks to malware, they simply added a null to the end of
obfuscation tools that help attacks slip past the most each PDF and DOC file (e.g. “echo’0000’>>1.doc). In
sophisticated anti-malware solutions. For hackers, addition, an unused header section was modified on
working with unknown malware has become the each executable file. Next, they opened and ran each
go-to tool because it’s easy and it’s efficient to create file to validate that the original behavior remained
variants from existing malware. In fact, it’s so easy unchanged. In a nutshell, by taking existing malware
that even someone who is not technical could do it. and making slight modifications to it, you very quickly
have something that won’t be recognized.
To illustrate, Check Point researchers took 300
known malware7, downloaded from a sample set With that simple technique, researchers were able
of well-known malicious PDF, DOC and executable to create new and unknown variants (hence the
files from Google’s “VirusTotal” database. The goal: “Unknown 300”) from existing malware.

UNKNOWN MALWARE: THE VAST UNKNOWN | 12


MD5 for echo '0000' >> originalmalware.doc
originalmalware.doc
fd96b96bd956a397fbb1150f3 MD5 for modified
83aac4393f17f1805111beaa76a4012e

KNOWN MALWARE UNKNOWN MALWARE

These previously unseen files tested the ability of Over the years this campaign has been active, it
security systems to detect unknown malware. has penetrated targets across the globe, allowing
hackers to monitor victims’ actions and steal
From there, suspect files were downloaded to sensitive information.
a host behind the security device, simulating
the accidental downloading of malware from a In selecting targets, it tends to choose primarily
malicious web page by an employee. defense contractors, telecommunications and media
companies, as well as educational institutions. We
In the case of the Unknown 300, if the file behaved as believe this is because these servers are publicly
expected, the data was allowed to enter the secure exposed, easily accessible gateways to private and
network. If it didn’t, threat emulation technology more secure internal networks. And, because they
created a signature for the type of file inspected and have a common business purpose, their security
ensured that file was blocked. It then communicated is often sacrificed for productivity, making them an
the signature to all security gateways, making the easy target for attackers.
unknown malware recognizable, or known.
The campaign is able to fly under the radar because it
Recently, Check Point discovered an attack campaign limits its actions to achieving specific goals in order to
that originated in 2012, but has since been mutating minimize the risk of exposure. A typical Volatile Cedar
into newer versions. Called Volatile Cedar, it uses a attack starts with a scan of the target’s server. Once
custom-made malware implant called “Explosive.” it identifies an exploitable vulnerability, it injects a

41% of organizations downloaded at least one


infected file with unknown malware

UNKNOWN MALWARE: THE VAST UNKNOWN | 13


52% of files infected with unknown
malware are PDFs

web shell code into the server. The web shell is then vulnerabilities of which vendors aren’t yet even
used as the means through which the Explosive aware. Compared with the cost of an unknown
Trojan is implanted into the victim server. Once inside, malware kit, hackers find that zero-day malware is
it lets the attackers send commands to all targets via much more expensive. This, alone, is probably why
an array of command and control (C&C) servers. The zero-day attacks tend to be selectively targeted.
command list contains all the functionality required
by the attacker to maintain control and extract One of the notable zero-day attacks of 2014 was
information from the servers, such as keylogging, called “Sandworm,” a reference to creatures from
clipboard logging, screenshots, and run commands. the science fiction series, “Dune.” In a targeted
attack on NATO, the Ukrainian government, and
Then, once the attacker gains control over these some other political targets, Russian hackers
servers, s/he can use them as a pivot point to explore, exploited the CVE-2014-4114 vulnerability—the
identify, and attack additional targets located deeper OLE package manager in Microsoft Windows and
inside the internal network. Windows Server. The vector: malicious PowerPoint
files sent as email attachments. When a user clicked
But even worse than unknown malware is zero-day on the attachment, an exploit was activated and
malware. What’s the difference? Unknown malware installed malicious code that opened a backdoor
builds off of known malware; zero-day malware is into the system. As a result, attackers could then
effectively built from scratch, to exploit software execute commands.

YOU SAY YOU WANT AN EVOLUTION:


EVOLVING MALWARE—EVOLVING TECHNOLOGY

The first generation approach to improving malware ways to simulate an actual user opening the file.
catch rates was to run suspect files in a sandbox Next, you would watch to see if it triggered anything
outside the network; the point was to emulate a beyond what was normally expected. The problem:
standard operating system (OS) in a restricted Cybercriminals recognize these safeguards
environment for safe observation. Then, using exist on some percentage of networks and are
sandbox tools, you would activate files in various already implementing simple evasion techniques.

UNKNOWN MALWARE: THE VAST UNKNOWN | 14


CHECK POINT CLOSES THE SECURITY GAPS

IPS, ANTI-VIRUS
& ANTI-BOT | CATCHES KNOWN OR OLD MALWARE
Of known malware, 71 in 1000 are not caught

OS- AND CPU-LEVEL


ZERO-DAY PROTECTION | DETECTS NEW OR UNKNOWN MALWARE
With both OS- and CPU-level prevention

THREAT EXTRACTION | COMPLETE THREAT REMOVAL


Reconstructs and delivers malware-free documents

2.2 SOURCE: Check Point Software Technologies

For instance, the malware might remain dormant make CPU-level sandboxing the best technology
until specific conditions are met, such as opening on in detecting zero-day and unknown attacks.
a Tuesday, or when the user right clicks. This is why
it’s important to constantly focus on innovation and Taking that approach a step farther, when you
the latest in security technologies, to stay ahead of combine deep OS- and CPU-level sandbox
the hackers. capabilities with threat extraction, such as Check
Point’s Next Generation Zero-Day Protection, you
First-generation OS-level sandbox solutions help up the ante for threat elimination. At the OS level,
prevent some zero-day attacks and can detect you can detect attacks in both executable and data
malware once it is running. However, a lot of files alike. At the deep CPU level, you’re able to
malware can still avoid detection. For that reason, detect an infection in data files at the exploit phase.
a next-generation zero-day protection method is Threat extraction, the third prong of this powerful
needed: CPU-level sandboxing. combination, intercepts all documents, whether
malicious or not, and removes dynamic objects to
While there are countless vulnerabilities, there protect against any zero-day attack. Then, it flattens
are only a handful of exploitation methods that the file and delivers the document in an image-like
can be used to download the malware and execute format that is threat-free.
it. CPU-level sandboxing lets you detect the use of
exploitation methods by carefully examining CPU As evasion techniques evolve and get smarter, along
activity and the execution flow at the assembly with the types of attacks, so must the technology
code level while the exploit occurs. As a result, to keep your business secure. What has emerged
it preempts any possibility of hackers evading as cutting edge in 2014 will simply be the standard
detection. The speed and accuracy of detection for 2015.

UNKNOWN MALWARE: THE VAST UNKNOWN | 15


How Threat Emulation Could Have
Prevented a Retail Breach

Black Friday, which follows the United States’ Thanksgiving holiday, is one of the biggest shopping
days of the year. On the Monday just before the 2014 holiday, Check Point Incident Response Team
(CPIRT) was contacted by a retailer who had discovered unknown files on their systems. These files
were not detected by major anti-virus vendors. The bits of available intelligence on each individual
file may not have been enough to sound alarms, but the collective sum painted a much larger picture.
The files appeared to be part of a kit designed to deliver malicious payload laterally, through a network.

Kit components consisted of tools used to:


• Extract, capture, and manipulate login credentials from Windows systems
• Capture keystrokes on Windows systems
• Transfer files

Still, details gleaned about other files in the kit were more ambiguous. Continuing with the
investigation, the response team sought to confirm some suspicions by running the files
through Check Point’s online ThreatCloud Emulation Services. Many of those files were flagged
as suspicious and showed downright malicious activity. One was particularly interesting to this
situation: The file was caught writing a text file in a Windows system directory.

Seeing the file write tracks.txt in the C:\Windows\System32\ directory upheld the belief that this
file was PoS malware, designed to harvest card track data. With that knowledge, it became evident
that this malware was part of a kit that could capture credentials; use them to install malware;
move around inside; and exfiltrate data out of the network. Had Threat Emulation been deployed,
this malware—and other components in the malicious kit—could have been blocked.

UNKNOWN MALWARE: THE VAST UNKNOWN | 16


RECOMMENDATIONS

To address unknown malware and zero-day Key factors to consider in selecting a good
threats, you need to be able to identify them within sandbox include:
and beyond the operating system. The goal: to • Ability to block attacks, not just detect them
not only spot the threats, but also address • Ability to avoid evasions
evasion techniques. Check Point recommends • Fast and accurate detection
utilizing a three-pronged approach: a combination • Ability to decrypt SSL
of OS- and CPU-level sandbox capabilities with • Ability to support common file types
threat extraction. • Ability to support web objects such as Flash

“Only the unknown frightens men.


But once a man has faced the unknown,
that terror becomes the known.” 8
-Antoine de Saint-Exupery, writer and poet

UNKNOWN MALWARE: THE VAST UNKNOWN | 17


03
KNOWN MALWARE:
KNOWN AND DANGEROUS

“We’re all digital, we’re all vulnerable and


everything’s instant—so instant. Instant
success and instant failure.” 9
–Madonna, pop star, on the digital theft and leaking of her unfinished album, “Rebel Heart,”
before it was released.

18 | INTRODUCTION AND METHODOLOGY CHECK POINT - 2015AND


INTRODUCTION SECURITY REPORT | 18
METHODOLOGY
TOP 5 COUNTRIES

HOSTING HOSTING DOWNLOADING ACCESSING


MALICIOUS FILES MALICIOUS SITES MALICIOUS FILES MALICIOUS SITES
38
38

26

22
PERCENT OF ORGANIZATIONS

17
14

8 8 8
7
6 6
5 5 5
4 4 4
3
2
K
S

CE

IA

EL

IA

EY

IA

EL

O
N
U

U
AD

N
U

IC

IC
U

U
N
SS

D
RK
RA

RA
AN

AI

LA

EX

EX
IN

IN
N

RU
KR

TU
IS

IS
FR

PO
CA

M
U

3.1 SOURCE: Check Point Software Technologies

Given how easy and powerful unknown malware organizations downloaded a malicious file. Looking
is to create and launch, you would think we would at speed and frequency, hosts accessed a malicious
start seeing a decline in known malware. The reality, website every 24 seconds (compared to every minute
however, is that hackers continue to keep this in the previous year), and downloaded malware
method of attack in their arsenal. every six minutes (compared to every 10 minutes in
the previous year). When you consider how quickly
In 2014, Check Point researchers discovered that viruses can spread and wreak havoc, this goes way
roughly 86 percent of organizations accessed a beyond alarming.
malicious site. What’s more, close to 63 percent of

In 2014 hosts In 2014 hosts


downloaded malware accessed a malicious site
every 6 minutes every 24 seconds

KNOWN MALWARE: KNOWN AND DANGEROUS | 19


THERE WILL BE BOTS

One of the more efficient ways to amplify and frequency represents a 66.7 percent jump from
accelerate the spread of malware is through bots— the previous year, and a 95 percent increase
when a computer has been infected with a Trojan or from 2012.
virus, it can allow third-party control over some or all
of the machine’s functions. A botnet is a network of When looking at bots, what kind of damage are
botted or zombie computers under the command of we talking about? Stealing banking credentials
an individual or organization that uses them to forward and other sensitive information; disabling system
spam email, attack other computers, or launch security services; installing malware; performing
DDoS attacks. click-fraud; gaining remote access; and opening a
backdoor for attacks comprised the majority of bot
Almost 83 percent of organizations had existing bot activity in 2014.
infections in 2014. And 47 percent of those were
active for more than four weeks—a disturbing One of the more notable bot infections took
length of time given that a bot communicates advantage of a vulnerability in Apple’s Mac
with its command and control (C&C) center computers in concert with the social, entertainment,
every minute. What’s more, that speed and and news site Reddit. A backdoor entry called

83%
of the organizations studied were infected
with bots. And, a bot communicates with its
C&C every minute

FAMILY ATTACK COUNT DAMAGE


ZEUS 51,848,194 Steals banking credentials
GRAFTOR 21,673,764 Downloads malicious files

RAMNIT 12,978,788 Steals banking credentials


Disables system security services,
CONFICKER 12,357,794
gains attacker remote access
SALITY 11,791,594 Steals sensitive information

SMOKELOADER 9,417,333 Installs malware

RAMDO 5,771,478 Performs click-fraud

GAMARUE 3,329,930 Opens a backdoor for attacks

TORPIG 3,290,148 Steals sensitive information

3.2 SOURCE: Check Point Software Technologies

KNOWN MALWARE: KNOWN AND DANGEROUS | 20


“Mac.BackDoor.iWorm” gained access to Macs. It seems that this year, hackers followed the
From there, it used Reddit to connect the hacked principle that if it isn’t broken, don’t fix it. According
computer with a command server. After infecting the to the Spamhaus Botnet Summary Report for 2014,
computers, hackers would post to Reddit and then ZeuS led the list of bots with 2,246 command and
take advantage of the site’s search function to controls, practically twice as many as Citadel, the
identify those posts. Using the iWorm, they were next leading bot.10
able to capture server addresses from the posts and
use them as a guide to connect to the botnet. So with the reach and power of bots at their
disposal, what are cybercriminals most focused
The bot that had the most action for 2014, however, on? Essentially, critical elements that significantly
was also the reigning champ the year before: ZeuS. hamper an organization’s productivity.

Whirlwinds of Credential Harvesting

Tool automation and botnet distribution make credential harvesting through brute force easier every day.
For instance, prior to 2014, only one computer at a time could crack a password. This past year, however, a popular
password hash-cracking tool called Hashcat modified its source code to allow for distributed cracking—so
more than one computer could help to crack the password—making operations much faster for attackers.

So how does it work? Criminals capture large amounts of data from attacks. Sometimes it’s hashed or coded, and
not easy to use right away. That’s where the tools come in—they automate the cracking of the passwords and may
already be part of a botnet that allows for easier distribution. Once the hashes are cracked, brute force attacks try to
exploit password reuse; they also test to see if one person’s password works for someone else’s login. In fact, Check
Point has observed constant brute force attacks lasting weeks, where the attempts per second/minute/hour/day
are tuned by the attacker to evade detection. What’s more, this can lead to dumps on open text sharing sites like
Pastebin, where the information can then be sold.

To safeguard password storage, generate a cryptographic one-way hash of a password. In other words, if a
password is “bluesky,” a cryptograph will turn it into something like “fna84K.” This prevents keeping plain-text
passwords around and permits verification of user-supplied passwords by repeating the one-way hashing system.
Adding a randomly generated value to a password before creating their cryptographic hash can also increase the
difficulty of a password-cracking operation.

Since tools already exist to crawl the internet for hashes and passwords—and automate distributed password
cracking—fortifying the way you store this data is critical. To keep this information safe, take extra precautions
and use dual-factor verification, out-of-band user authentication, or even biometric authentication.
Remember, the fact that people reuse similar passwords means that every breach of thousands of
names creates the seeds for, potentially, hundreds of additional breaches.

KNOWN MALWARE: KNOWN AND DANGEROUS | 21


DDOS: THE NEW PICKET LINE

In the past, if you wanted to contest a company’s from eight times per day in 2013. That represents
policies, you’d gather some people, make some a 500 percent increase! Last year, the majority of
signs, and stand outside their place of business for DDoS attacks was found largely in the consulting
a very public display of protest. Now? You just go sector. This year, it spans almost two thirds of
online and buy an inexpensive DDoS toolkit, enter businesses across all industries. After DDoS, the
the URL for the company you’re protesting, and next biggest attack vectors for the year were Buffer
you’re done—the company’s website is defaced. It’s Overflow, an attack that can corrupt data, and Code
easy, convenient, and cheap. Execution, which allows a hacker to inject arbitrary
code. Both increased significantly from the
In 2014, Distributed Denial of Service (DDoS) was previous year.
the top attack vector, accounting for 60 percent

48
of all attacks, almost double from the previous
year. DDoS attacks, which temporarily knock a DDoS attacks occurred
server or other network resource out of service, every day in 2014
were occurring 48 times per day in 2014—up

TOP ATTACK VECTORS


2014 2013
PERCENT OF ORGS WITH AT LEAST ONE ATTACK

60

51

47
43

39
36
35

23 23 22
19

DENIAL OF BUFFER CODE CROSS-SITE ANOMALY MEMORY


SERVICE OVERFLOW EXECUTION SCRIPTING CORRUPTION

3.3 SOURCE: Check Point Software Technologies


KNOWN MALWARE: KNOWN AND DANGEROUS | 22
HACKTIVISM:
When Protestors Take Their Ideology Online

The past year saw an upswing in DDoS against educational facilities, service providers, US state
governments and city governments. Regardless of politics, the effects of hacktivism through DDoS
attacks are felt by innocent bystanders as much, if not more than, the intended targets. In countries
where the government provides the majority of connectivity for educational services, an attack on a
small school can impact every school in the network. A DDoS targeting one city’s website can cause
(and has caused) a loss of VPN connectivity with law enforcement field units and emergency
services—and not just during a major protest.
While the order of steps may vary, there are four main techniques used by hacktivists:
1. A multi-wave volumetric attack that uses millions of user datagram protocol (UDP) packets
on port 80. As a stateless protocol, UDP is very easy to fake, making the source appear as if it was
sent from a different internet protocol (IP) address. This floods the connection before organizations’
premise security devices can detect and react.
2. A domain name system (DNS) ‘reflection’ attack in which attackers send millions of DNS queries
to legitimate DNS servers, using a spoofed source IP address to appear as if they originated from a
server on the victim’s network. The legitimate DNS servers react by flooding DNS responses to
the victim, causing another wave of volumetric attacks.
3. A SYN flood attack targets a specific host. Spoofing the source address in high volume, it consumes
enough resources so that the host is unresponsive to legitimate traffic.
4. Slow attacks open as many connections as possible to a server and keep those connections open as
long as possible by sending bits of data right before the transmission control protocol (TCP) sessions
time out. The traffic is low, but the volume of slow connections congests inbound network ports.
Here’s what you can do to secure your organization:
1. Understand and monitor traffic volume such as connections per second, packets per second, and
throughput per second. If baseline thresholds are exceeded, tools like Check Point DDoS Protector TM
can be deployed in front of security gateways to mitigate DDoS traffic before reaching the gateway.
When volumetric attack traffic exceeds the internet circuit speed, it will saturate the network
connection before it reaches DDoS Protector or the security gateway, thereby denying service.
To prevent that from happening, DDoS Protector diverts traffic through DefensePipe to internet
scrubbing centers, where malicious traffic is removed and clean traffic is diverted back.
2. Implement tight controls on networks with guest access or unknown users’ bases such
as educational facilities, cloud providers, and service hosting companies.
3. Deploy source IP spoofing rules to prevent users on targeted networks from launching reflection
attacks. Dynamic, variant, and multi-wave styles of attacks can make it challenging to stop every
form of DDoS. But, Check Point’s Firewall Software Blade and IPS Software Blade have mitigation
tools and protections built into them—such as Rate Limiting, SYN Defender and IPS SYN Attack, and IPS
DNS—to help prevent DDoS attacks.

KNOWN MALWARE: KNOWN AND DANGEROUS | 23


CRITICAL INFRASTRUCTURE
DOOMSDAY: Not “If,” but “When”

James Arbuthnot, former chairman of the UK Defense Select Committee, said it best: “Our national grid is
coming under cyberattack not just day by day, but minute by minute.”11 In fact, nearly 70 percent of critical
infrastructure (CI) companies suffered a security breach over the last year.12 One attack during 2014, by a
group of Russian hackers called Energetic Bear, launched a campaign that targeted oil and gas companies.
Through infection of industrial control software that those companies relied on, attackers embedded
malware that automatically downloaded and installed when the victim organizations updated their
software. This gave attackers visibility into—and potential control of—the targeted networks.

In a separate incident, a German steel mill was targeted, causing major damage to a blast furnace.
According to the German Federal office of Information Security, BSI, attackers deployed a socially
engineered spear phishing campaign to trick specific individuals into opening messages. From there,
the cybercriminals were able to capture login names and passwords, which helped them access the
mill’s production network. Once in, they went after the control systems, causing elements to fail, which
prevented the furnace from shutting down normally. As a result, the whole system was impaired.

Why is this happening?


When we look at the causes of CI incidents, we see a few things going on. To begin with, the supervisory
control and data acquisition (SCADA) system, commonly used by CI, was not designed for security. Not only
are its devices vulnerable, its networks are old and outdated. Plus, SCADA systems embed Windows and
Linux operating systems, which are also vulnerable. A second cause is that, too often, the view of security
is short-sighted, with an emphasis only on the electronic perimeter. This falls short because it leaves the
production systems at risk. Finally, a third problem that we see is the mistaken belief that good physical
security means good network security. Not recognizing the difference can lead to severe consequences.

Securing critical infrastructure: What to do


Just as we see three causes of CI incidents, we also see three key paths to preventing such occurrences.
Below are steps to safeguard critical infrastructures.

1. Security Architecture: First and foremost, protect the corporate network to block infiltration of the
production network. Then, segment and protect your production network with specialized security. For
perimeter security, use proper tools such as firewall, intrusion prevention, anti-virus, anti-bot, and
threat emulation.

2. Security Products with Granular SCADA Support: Always use products specifically designed for SCADA
systems. Remember, CI industries rely on dedicated systems on specialized networks with unique protocols.
Solutions like Check Point SCADA security solutions include SCADA logging, firewall, app control, intrusion
prevention, and SCADA workstation endpoint security.

3. Threat Intelligence: Be sure to independently log all SCADA activity by using in-depth SCADA traffic
monitoring and analysis for threats.

KNOWN MALWARE: KNOWN AND DANGEROUS | 24


TOTAL NUMBER OF COMMON 2014: BY VENDOR
VULNERABILITIES AND EXPOSURES TOP VULNERABILITIES AND EXPOSURES

7945 450
431
NUMBER OF VULNERABILITIES

376 368
5736 5632
5191 5297 287
4651
4155

156 155
138 135
120
11

LA
10

UX
E
14

M
13

LE
08
09
12

FT

AT
SC

PL

OB
L
20

IB

IL
20
20

20

20
20
20

DH
SO
AC

N
OG
CI

AP

OZ
AD

LI
RO
OR

GO

RE

M
IC
M
SECURITY EVENTS BY TOP SOFTWARE PROVIDERS
2014 2013 2012
77
PERCENT OF ORGANIZATIONS

67 68

14 15 15
13
10
6 6 5 5
3 3 4 4 4 3 3 2 2 1
T

AP E
HE

HP

LA

AN

OM

CA

LL

LL

AN
OF

OF

OF
OB

CL

OB

CL

PL

CL

OB
LL

UI

UI
E

E
OM
AC

OL

OL
3C

SQ

SQ
OV

OV
I
S

S
RA

RA

RA
AP
AD

AD

AD
OZ
RO

RO

RO
DE

DE
JO

N
/O

/O

/O
M
IC

IC

IC
VI

VI
N

N
M

M
SU

SU

SU

3.4 SOURCE: Common Vulnerabilities and Exposures (CVE) Database (top charts), Check Point Software Technologies (bottom chart)

FEELING VULNERABLE

One of the big issues that organizations need to vulnerabilities and exposures over the past three
address to help shore up their security is to patch years, we saw little increase between 2012 to 2013.
and update software. When this is overlooked, However, from 2013 to 2014, we saw a jump of just over
it creates a serious business vulnerability that can 53 percent.13 So while the good news is that awareness
needlessly interrupt performance—of man and is increasing around these potential exposures, the
machine. Looking at the total number of common bad news is that they still exist and are growing.

KNOWN MALWARE: KNOWN AND DANGEROUS | 25


SHELLSHOCK: Hitting Networks at Their Core

Hackers understand the most impactful way to strike targets is to attack their foundations. For most
operating systems, that foundation is a series of fundamental commands, often executed in Unix.
At the core of the command line shell used commonly in Apple MAC OS X and Linux/UNIX operating
systems is a command processor called Bash, or Bourne Again Shell.

In September 2014, a major security vulnerability was discovered in Bash that let attackers remotely
execute shell commands. It worked by attaching malicious code in environmental variables used by
the operating system.

From a hacker perspective, it does not get much better. Within days of the vulnerability announcement,
additional design flaws were also discovered and a series of patches were created. The race was on
to strike networks before the patches were inserted. Within hours, attackers exploited Shellshock
by creating botnets on compromised computers, to perform distributed denial-of-service attacks
and vulnerability scanning. While Check Point IPS-protected networks were patched the same day,
Shellshock compromised millions of unpatched servers and networks.

Check Point customers supported by IPS protection saw blocked attempts as the attacks prominently
targeted HTTP, Mail (SMTP/POP3/IMAP), FTP and DHCP protocols. Research findings showed
that the US was both the top target and the top attacker by a significant margin.

EXPLOITS’ NEW TARGET:


OPEN-SOURCE SOFTWARE AND OS

Community sharing isn’t always a good thing. Take has become an attractive target in order to steal data,
open-source software (OSS), for instance. Unlike intellectual property, and other sensitive information.
typical proprietary software that is closed, open- Thus, it becomes an open door to the network for
source software is written so that its source code is hackers to exploit.
freely available to the public and can be modified by
anyone. Worse, OSS is not managed as closely because For instance, OpenDaylight, a multi-vendor open-
it’s not always part of the IT procurement process. source software project, was forced to focus on
And, because it’s freeware, it’s not as closely security when a software-defined networking (SDN)
maintained as other software. Cybercriminals know flaw came to light. In August of 2014, a critical
this, so they redeploy attacks toward less-maintained, vulnerability was found in its platform, but it took
less-visible applications and systems. As a result, OSS about four months to get patched. The person

KNOWN MALWARE: KNOWN AND DANGEROUS | 26


who found the vulnerability had initially tried to like user identities, passwords and other sensitive
report it privately, but since OpenDaylight did not information that is contained in the servers.
have a security team, his efforts went nowhere. Instead,
he ended up posting the vulnerability on a popular Then, along came Shellshock. The staggering shame
mailing list for security flaws. At issue was the potential of this is that it stems from a quarter-century-old
for an SDN controller to be compromised, which would security flaw that allows malicious code execution
enable attackers to take control of the network. 14
within the Bash shell. This lets a hacker take over an
operating system and access confidential information.
One open-source vulnerability discovered during 2014 Adding to that, many programs run Bash shell in the
was with the MediaWiki platform, which is used to run background. When extra code is added within the lines
Wikipedia and thousands of other wiki sites worldwide. of existing code, the bug is let loose.15
Check Point researchers discovered that a defect in
the code could allow attackers to inject malicious code Following up Shellshock was Poodle, a cute acronym
into every page in Wikipedia.org, as well as into other that stands for Padding Oracle On Downgraded Legacy
internal or web-facing wiki sites running on MediaWiki. Encryption. Its focus: an 18-year-old encryption
With more than 94 million unique visitors per month to technology, SSL 3.0. If a website uses that protocol
Wikipedia alone, and almost 2 million sites linking to it, to encrypt traffic, attackers could prompt your
it’s easy to see the potential for widespread damage. computer to downgrade its encryption to that same
antiquated standard, creating security issues with
The biggest open-source exploits of the year were communications to servers.16
Heartbleed, Shellshock, and Poodle. In the past year,
it seemed that businesses were hit with new, Open-source vulnerabilities like Heartbleed, Poodle
devastating malware that was the worst ever—until and Shellshock affected nearly every IT operation in
months later, the next worst-ever new malware the world. Organizations may not be able to anticipate
arrived on the scene. Heartbleed was uncovered in the next massive vulnerability, but they should
April 2014, a vulnerability in OpenSSL software. What understand that hackers love finding and exploiting
it does is allow hackers access to the memory of data flaws in open-source and commonly used platforms
servers—up to 64 kilobytes worth. This access then (such as Windows, Linux, and iOS) because of the rich
gives them the ability to steal critical information opportunities they offer.

NO ONE TO BLAME BUT OURSELVES

TOP IPS
EVENTS
40% In 2013, servers were the preferred target. Last year
this all changed: Clients are now the weakest link.
SERVER

When we look at the change in the distribution

60% of top IPS events between Client and Server, we


see that the Client side jumped dramatically—to
CLIENT
PERCENT OF TOTAL 60 from 32 percent. Meanwhile, the server side

3.5 SOURCE: Check Point Software Technologies


KNOWN MALWARE: KNOWN AND DANGEROUS | 27
dropped from 68 percent to 40 percent. Why? packs; 25 percent don’t have updated versions of
Hackers show a preference for targeting clients their software; and 17 percent don’t have anti-virus
because they can use social engineering and installed at all. In addition, 35 percent of enterprise
phishing tactics to trick people. In other words, hosts are configured such that users have local
humans are much easier to dupe than machines. administrator permissions, putting their operating
systems at greater risk for malware exploitation.
So what’s contributing to the problem? Negligence
around basic protections. In addition, organizations are While those numbers might not seem huge, it’s still
using legacy security tools that fall short in addressing an important flag that there are some enterprises
the evolving threats of today. If you want to keep your that are not getting the security message: It only
endpoints safe, you start with fundamental actions like takes one vulnerable host to infect an entire
ensuring your computers are running desktop firewall; network. And think about the number of businesses
have updated service packs and software; and have with whom those enterprises interact and exchange
the latest anti-virus software installed. information. Part of managing the threat of
cybercrime means being a responsible cyber citizen
Yet according to our findings, 20 percent of enterprise when it comes to basic protections—and sharing
hosts are not running a desktop firewall; 10 percent important security information with others.
of enterprise hosts don’t have updated service

ENTERPRISE ENDPOINT
VULNERABILITIES AND MISCONFIGURATIONS

54% 25%
Hosts that have at least Hosts that do not have
one Bluetooth device installed updated AV signatures

20% PERCENT 25%


Hosts that do not run OF HOSTS Hosts that do not have
desktop firewalls updated software versions

35% 10%
Hosts where user has Hosts that do not have
local admin permissions the latest service pack

3.6 SOURCE: Check Point Software Technologies


KNOWN MALWARE: KNOWN AND DANGEROUS | 28
Compliant Without Complaint

While most businesses understand their responsibilities around compliance and meeting industry
regulations when it comes to security, it’s still a very complex issue. You could be fully compliant
one day, and then make a business-related change to your network and suddenly find yourself out
of compliance. Knowing what to watch for is critical. But don’t fall into the trap of thinking that just
because your organization is compliant it is completely secure. Meeting regulatory requirements
is typically tied to specific threats, making it less comprehensive than a security posture could and
should be. It should not be the basis of your security policy. Below is what Check Point discovered
in its 2014 research.

CHECK POINT CHECK POINT COUNTRIES IMPACTED


FINDING ISSUE ANALYSIS REGULATION BY THIS REGULATION

Anti-Spoofing not Anti-spoofing verifies that packets are PCI DSS 3.0 Global—any company
being activated coming from, and going to, the correct processing or storing
for 75% of the interfaces on the gateway. It confirms credit card data
respondents that packets claiming to be from an
internal network are actually coming NIST 800:41 Mainly relevant to US
from the internal network interface. Federal, but equally
It also verifies that, once a packet applicable to any US
is routed, it is going through the company adopting a
proper interface. robust firewall standard

ISO 27001 Global—any company


being certified to this
standard or adopting it
as a best practice

Discovering Any Any The fundamental concept of the firewall PCI DSS 3.0 Global—any company
Accept rule in 27% rule base is “That which is not explicitly processing or storing
of respondents permitted is prohibited.” credit card data
To discover that 27% of respondents had NIST 800:41 Mainly relevant to US
an Any Any Accept rule in their rule base Federal, but equally
was a major surprise. This is firewall applicable to any US
101, the basic of basics. company adopting a
robust firewall standard

ISO 27001 Global—any company


following this standard

Out-of-State TCP TCP session timeout is the length of PCI DSS 3.0 Global—any company
packets not being time an idle connection will remain in processing or storing
dropped in 19% the security gateway connections table. credit card data
of respondents This idle session is the delay in which an
attacker can try to steal and use existing ISO 27001 Global—any company
user session package transportation. being certified to this
standard or adopting
Packets that are out of state should it as a best practice
be dropped. We found that 1 out of 5
companies are not dropping out of
state packets.

KNOWN MALWARE: KNOWN AND DANGEROUS | 29


Keep History from Repeating Itself

‘Those who do not learn from history are doomed to repeat it.’
This rings true in security, as well.

Keeping current with the issues and employing best security practices can keep businesses of all
sizes safe from the doom of replaying past mistakes. Below is a roundup of best practices that can
help you avoid some of the security pitfalls of large and small customers.

Protections in Detect vs Prevent


With network protections, ‘Detect’ mode is used for low-risk threats, while ‘Prevent’ mode is used
for critical severity and high-risk threats. We often hear from customers that an attack was ‘detected’
but not ‘prevented’ because it was miscategorized. Be sure to review threat policies regularly to
understand how to properly categorize them.

Patches Out of Date


Despite the fact that patches are available for years-old vulnerabilities on platforms, they are often
not installed. Attackers zoom in on this weakness; the older the vulnerability, the more likely an open-
source exploit is available. To avoid being an easy target, we recommend patching early and often.

Poor Password Policy or Password Reuse


Most of the credentials harvested in brute force attacks are taken because an account password is
weak. Other times, accounts are harvested because a password for one site was used on another
site that was compromised. By mandating stronger password policies and educating users about
password reuse, businesses can minimize account breaches. Moreover, good password policies
make stronger networks.

Inter-Department Compartmentalization
In large organizations, we often observe a common theme of information compartmentalization and,
sometimes, finger pointing between departments. In its most innocent form, some companies lack
internal information-sharing mechanisms or consistent IT policies; this results in one group having
a much more modern network than another. Unfortunately, many are not segmented internally so
a breach for one can result in a breach for all.

KNOWN MALWARE: KNOWN AND DANGEROUS | 30


RECOMMENDATIONS

You would think that if something is known, it would • Cover the Critical. Extend your IPS protection to
be easier to keep in check. As you’ve read about make sure you’re able to defend against critical
known malware in this chapter, it’s clear that notion severity attacks. Cover your network server and IT
is misguided. infrastructure systems, regardless of the vendor
or platform.
Combatting known malware requires a multi- • Manage and Maintain. Keep on top of vulnerabilities
pronged approach. The core principle: Automate and with patching processes for all systems and
coordinate multiple layers of defense. applications.
• Detect and Defend. Be sure to utilize gateway and • Regulate and Restrict. When it comes to client
endpoint anti-virus software blades along with URL and server configuration, restrict the use of
filtering. This helps prevent connections with known administrator privileges; disable Java and other
distributors of malware. scripting; and regulate what applications can
• Block the Bot. Use an anti-bot software blade be installed on endpoints.
to spot malware and blunt botnet communications.

“There is no such thing as perfect security,


only varying levels of insecurity.” 17
–Salman Rushdie, author

KNOWN MALWARE: KNOWN AND DANGEROUS | 31


04
MOBILE SECURITY:
DON’T FENCE ME IN

“Apart from the known and the unknown,


what else is there?” 18
–Harold Pinter, Nobel Prize-winning playwright, screenwriter, director, actor

32 | INTRODUCTION AND METHODOLOGY CHECK POINT - 2015AND


INTRODUCTION SECURITY REPORT | 32
METHODOLOGY
42% suffered mobile security incidents
costing more than $250,000

When mobility came along, so came the promise of security problems. As an attack vector, mobile
untethered productivity. But for many, mobile security devices provide easier direct access to valuable
was an afterthought. The goal for all should be to organizational assets than any other network
identify solutions that enable productivity, regardless intrusion point, making them the weakest link in
of whether you’re on or off premises. And this the security chain.
becomes especially important as we see a rise in the
usage of smartphones and tablets—along with their In a Check Point-sponsored global survey of more
associated apps—to make our lives easier. Because than 700 businesses, 42 percent of the survey
with that rise has come a desire to do business with sample had suffered mobile security incidents
those same devices, putting corporate data at risk. costing more than $250,000 to remediate—and 82
percent expected incidents to rise during 2015.
Predictably, the rising trend of Bring Your Own
Device (BYOD) has spawned a host of mobile

MOBILE SECURITY: DON’T FENCE ME IN | 33


CORPORATE DATA AT RISK
NETWORK EMPLOYEE
cc | INTELLECTUAL
PROPERTY | CREDENTIALS | LOCATION

PRIVILEGED
| COMMUNICATION | CALLS

4.1 SOURCE: Check Point Software Technologies

When mobile security is weak, it can provide magnified. In fact, 87 percent of IT professionals
attackers with personal information, passwords, say careless employees are a greater threat to
business and personal email, corporate documents, security than cybercriminals. And, 92 percent say
and access to company networks and applications. employee behaviors could have made a difference
In the business setting, that concern becomes in preventing high-profile security breaches.

OUT OF CONTROL

Among those surveyed, 91 percent have seen an So it’s no surprise that the top two BYOD security
increase in the number of personal mobile devices challenges faced by IT are securing corporate
connecting to corporate networks during the past information—reported by 72 percent of our sample;
two years. Alarmingly, 44 percent of organizations and managing personal devices that contain both
do not manage corporate data on employee-owned corporate and personal data and applications—
devices. Add to that, 33 percent of app developers cited by 67 percent of our respondents.
do not test their apps for security. 21

MOBILE SECURITY: DON’T FENCE ME IN | 34


BYOD challenges become even more notable in the countries were studied. If devices communicated
context of a separate global study we conducted. with a command and control (C&C) server, they
Commercial mobile surveillance kits, typically were considered infected. Researchers found that
used for monitoring children—or in some cases one out of every 1,000 devices was infected. And in
spying—were put under the microscope. The fact, researchers determined that if there are 2,000
reason: Such products are vulnerable to mobile devices or more in an organization, there is a 50
remote-access Trojans (mRATs), which top the list percent chance that there are at least six infected
of mobile malware. More than 500,000 Android and or targeted mobile devices on their network. By
400,000 iOS devices that connected to corporate platform, that breaks down to 60 percent Android
Wi-Fi through Check Point firewalls in more than 100 and 40 percent iOS.

BYOD SECURITY CHALLENGES

SECURING CORPORATE
INFORMATION 72

MANAGING PERSONAL DEVICES THAT CONTAIN


BOTH CORPORATE AND PERSONAL DATA AND APPLICATIONS 67

TRACKING AND CONTROLLING ACCESS TO


CORPORATE AND PRIVATE NETWORKS 59

KEEP DEVICE OPERATING SYSTEM AND


APPLICATIONS UPDATED 46

FINDING AGNOSTIC SECURITY SOLUTIONS


(I.E. MANAGING ALL OSs) 42

WE HAVE NO CHALLENGES WITH BYOD 5

OTHER 2 PERCENT OF ORGANIZATIONS

4.2 SOURCE: Check Point Software Technologies


MOBILE SECURITY: DON’T FENCE ME IN | 35
MOBILE THREAT RESEARCH:
Targeted Attacks on Enterprise Mobile Devices

Survey Sample
More than 500k Android and 400K iOS devices from more than 100 countries.

Infections
Approximately 1,000 devices infected: 60% Android, 40% iOS.

Malware
More than 20 variants and 18 different mRAT product families found.

Risk
Corporate data in the form of emails, messages, keystrokes, calls,
employee location.

WHAT’S THE HARM?

Attackers can target an enterprise and extract and attacking multiple targets inside them—
sensitive information from its employees’ mobile versus attacking corporate employees of random
devices. Malicious mRATs can allow potential organizations and targeting them without relation
attackers to steal sensitive information from to their organization.
a device. They can take control of the different
sensors to execute keylogging, steal messages, In the earlier survey referenced, when asked which
turn on video cameras, and more. mobile device platform posed the most problems,
64 percent of IT professionals cited Android
Interestingly, researchers discovered that as the riskiest. Apple iOS and Windows Mobile
employees of corporations are targeted by followed, both at 16 percent. Only four percent
mRATs. More specifically, the study showed that cited BlackBerry.
attackers were choosing certain organizations

MOBILE SECURITY: DON’T FENCE ME IN | 36


18 MRAT FAMILIES FOUND

Others

TalkLog
MobiStealth
My Mobile Watchdog
Shadow Copy Mspy

Mobile Spy

Bosspy

Spy2Mobile

4.3 SOURCE: Check Point Software Technologies


MOBILE SECURITY: DON’T FENCE ME IN | 37
BEWARE THE BINDER

The beauty of inter-process communication (IPC) is that it lets disparate specialized processes
cross function within an operating system. Within Android, the message-passing mechanism
of that system is Binder. In October 2014, Check Point’s research team exposed a fundamental
flaw associated with that system in a report entitled, “Man in the Binder: He Who Controls the
IPC, Controls the Droid.” In essence, our research team found it is possible to capture data
communicated over the Binder protocol and intercept sensitive details.

Other key findings:


• Information sent and received through applications on a device, including those
secured through two-factor authentication, encryption lines, and other security
measures, can be intercepted.
• Man-in-the-middle commands can be inserted into the path of the intercepted
command stream.
• Data intercepted via the Binder can include device keyboard input, in-application
activities such as banking transactions, and SMS messages.

Learn more about Man in the Binder and other research findings from Check Point at
checkpoint.com/threatcloud-central.

With Android’s risk factor so much higher than the need to consider the security implications of
others, it’s no surprise that hackers are having a wearable tech and companion devices like Fitbit,
field day with it. One recently discovered malware Google Glass, smartwatches and others that
tricks Android users into believing they’ve powered connect to tablets and smartphones. As the Internet
down their devices, when in actuality, they haven’t. of Things (IoT) becomes commonplace in many
The malware reportedly allows remote users to homes and workplaces, the interconnectedness
make calls, send and receive messages, and take of technologies will make it possible to read
photos. 22
Ultimately, this can enable a simpler everything going from one device to the other.
path to stealing identities, as well as data. This is why we need to get a grasp on mobile
security now.
Being aware of the risks associated with mobile
technology is critical. In coming months we will

MOBILE SECURITY: DON’T FENCE ME IN | 38


RECOMMENDATIONS

Don’t Rely on MDM as a Catch-All Shield the Space


Mobile Device Management (MDM) allows an Establish a secure business environment,
IT department to control what the user can and segregating your business data and applications,
cannot do with the device. But, there are two major including those on personally owned devices. If the
shortfalls with MDM: First, from the user side, MDM device becomes compromised, protections can be
policies can be very restrictive depending on the IT activated to protect corporate information until the
department; when employees feel restricted, they threat is removed.
tend to find ways around the security protections.
Second, from the organization side, MDM does not Thwart Threats
actually protect the device since MDM solutions Identify and prevent cyber threats to protect
do not include malware protection capabilities. your entire mobile device. Be sure your mobile
So, you still need to identify solutions that can security solution helps you prevent suspicious file
protect the device itself and control the data going downloads, block malicious websites, and prevent
in and out of it. threats before they do damage.

Protect on the Run Connect to the Cloud


Document protection is an overlooked aspect of Protect your network traffic using cloud services
mobile security. Control your business documents, that extend corporate policies to personal mobile
regardless of where they go. Encrypt files and devices (BYOD) to ensure you’re compliant. Look
ensure access by authorized users only. Solutions for a solution that enforces a single security
like Check Point Capsule provide document policy to both on- and off-premises devices,
security and granular controls on who can access and follows mobile users outside the enterprise
the data. security perimeter.

“What we are seeing with technologies like mobile devices and cloud computing
is that they are enabling business models that simply didn’t exist before….
Giants everywhere are ripe for disruption by new businesses that understand
how to use technology to create a brand new, never-before-possible value
proposition for its customers.” 23

-Eric Schmidt, chairman of Google

MOBILE SECURITY: DON’T FENCE ME IN | 39


05
APPLICATIONS:
GETTING YOU WHERE
IT HURTS

“As our society tips toward one based on data,


our collective decisions around how that data
can be used will determine what kind of a
culture we live in.” 24
–John Battelle, entrepreneur, author, journalist

40 | INTRODUCTION AND METHODOLOGY CHECK POINT - 2015AND


INTRODUCTION SECURITY REPORT | 40
METHODOLOGY
96% of organizations use at least
one high-risk application

It’s clear that the digital landscape is a treacherous To give you a sense of the pervasiveness of high-
one. Threats can come by attack, by internal error, risk applications, Check Point researchers found
by sabotage. The one thing that poses as an evidence of them in 96 percent of the organizations
especially vulnerable point of entry for businesses studied—a 10-point jump from last year.
is that which is most relied upon for organizational
productivity: applications. The main categories we look at include:
• Remote Admin Tools—applications like
Some applications, like file sharing, are obviously TeamViewer, RDP, and LogMeIn allow remote
risky. But others don’t as quickly come to mind operators to work with your machine and its
because they’re part of what’s come to be known as functions as though physically, in person. A handy
shadow IT—applications that aren’t sponsored or tool for troubleshooting IT problems, it’s also a handy
supported by the central IT organization. Instead, tool that can give hackers a frightening amount of
these technologies and applications are purchased control and power over your network.
and installed outside of IT as required tools to get • File Storage and Sharing—applications like
the job done. DropBox and others allow you to exchange and work
with larger files than you could ordinarily email.
Given others’ reliance on these applications, IT can’t • P2P File Sharing—BitTorrent Protocol and
block usage of them. So, if they are allowed, threat SoulSeek are just two popular examples of what is
prevention needs to be provided. The network must typically used for media exchange like music, videos,
be protected while operating under the assumption or real-time communication.
that these high-risk applications ARE malicious, • Anonymizers—browser plugins or web services
not that they MIGHT be. such as Tor or OpenVPN allow users to interact

APPLICATIONS: GETTING YOU WHERE IT HURTS | 41


ORGANIZATIONS USING HIGH-RISK APPLICATIONS
2014 2013 2012

92 90
86 86
81 80
77 75

61 62
56
PERCENT OF ORGANIZATIONS

43

REMOTE ADMIN FILE STORAGE AND SHARING P2P FILE SHARING ANONYMIZER

5.1 SOURCE: Check Point Software Technologies

online, anonymously. These can be used legitimately, Check Point found that the use of anonymizers
to minimize risk, but all too often, they are used for increased across the board in every vertical.
malicious purposes.
And while the top three vectors of each major
In 2014, remote admin tools (RATs) led the list of category of high-risk applications remained
the biggest offenders in high-risk applications, with somewhat consistent from last year to this year,
92 percent of organizations studied affected. Of there was more shakeup in the anonymizer category.
all the remote admin tools available, TeamViewer For instance, last year’s top three included Tor,
displaced RDP for first place for attack vectors Ultrasurf, and Hide My Ass. This year: Tor slipped to
in that category, with 78 percent of organizations third place; OpenVPN and Coralcdn were numbers
reporting incidents. one and two. Ultrasurf slid down the list and

Remote admin tools were found in


92% of organizations

APPLICATIONS: GETTING YOU WHERE IT HURTS | 42


Where’s Waldo?

Whether breaching for financial gain or hacking to make a point, attackers have several tools at their
disposal to mask their location and identities. And contrary to what Hollywood may portray, tracing and
identifying the criminals is very complex.

Cybercrime investigators admit that they are only catching ‘the bottom of the food chain’ when it comes to
computer crime. That’s because criminal enterprises managed by informed and experienced attackers are
likely to go undetected. Given that they are geographically distributed, well-structured and compartmented,
affiliated hackers only know a small part of the larger organization—further minimizing the exposure to the
criminal organization.

In operating under the radar, cybercriminals employ a host of tools to maintain their anonymity. It starts
with erasing the internet trail back to their source location. The most basic tool for this is a web proxy.
Also called anonymizers, a proxy server acts as an intermediary client computer, redirecting requests
to the ultimately desired destination. In the early days of the internet, web proxies helped conceal a
source’s IP address, but today are more easily countered and traced.

Hide Your Location


Use of VPN connections lets senders encrypt traffic between end points. The VPN server can be used
to hide a sender’s identity, making the source IP untraceable (in real time). The connection between the
attacker machine and the VPN server is encrypted so the traffic cannot be decoded. The VPN server itself
is not masked, nor is the data once it is forwarded beyond the confines of the VPN connection.

Hide Your Route


For more advanced anonymizing, some rely on tools like Tor networks. The “Tor project” uses free
software that leverages a network of 5,000 volunteer relays around the world, designed to mask any
individual user’s location and usage. Derived from the term ‘onion routing,’ the Tor network uses layers
of encryption on addressing so each relay only sees the address for the next relay, not the source or
ultimate destination.

Hide Your Computer ID


Each machine accessing the internet has a unique fingerprint: the machine’s internal MAC address, unique
to every computer processor, combined with its operating system and web certificates. One of the most
popular ways to mask a computer identity is “Tails,” a live operating system that can boot from a CD or
USB stick. It offers a “one-time workstation” feature that transfers the machine identification signatures to
the CD/USB operating system. Hackers use it once, then simply destroy the CD/USB. This allows an attacker
to “switch” machine identities as many times as they want on the same computer.

In some cases, hackers use multiple cloaking layers, such as connection to a VPN behind the Tor network,
sourced from a public Wi-Fi, obscuring both the source machine and internet routing locations.

APPLICATIONS: GETTING YOU WHERE IT HURTS | 43


TOP HIGH-RISK APPLICATIONS BY REGION

2014 AMERICAS EMEA APAC

ANONYMIZER Hola ∙ Tor ∙ Coralcdn OpenVPN ∙ Coralcdn OpenVPN ∙ Coralcdn ∙ Tor


Proxy Suppliers

BitTorrent Protocol ∙ SoulSeek BitTorrent Protocol ∙ SoulSeek BitTorrent Protocol ∙ Xunlei


P2P FILE SHARING
BoxCloud iMesh QQ Download

FILE STORAGE Dropbox ∙ Hightail


AND SHARING
Dropbox ∙ Hightail ∙ Jalbum Dropbox ∙ Hightail ∙ Mendeley
Windows Live Office

REMOTE ADMIN RDP ∙ LogMeIn ∙ TeamViewer TeamViewer ∙ RDP ∙ LogMeIn TeamViewer ∙ RDP ∙ LogMeIn

2013
ANONYMIZER Tor ∙ Ultrasurf ∙ Hotspot Shield OpenVPN ∙ Coralcdn Ultrasurf ∙ Tor ∙ Hide My Ass
Proxy Suppliers

BitTorrent Protocol ∙ SoulSeek BitTorrent Protocol ∙ SoulSeek BitTorrent Protocol ∙ Xunlei


P2P FILE SHARING
BoxCloud eDonkey Protocol SoulSeek

FILE STORAGE Dropbox ∙ Windows Live Office Dropbox ∙ Windows Live Office Dropbox ∙ Windows Live Office
AND SHARING Hightail Hightail Hightail

REMOTE ADMIN RDP ∙ LogMeIn ∙ TeamViewer RDP ∙ TeamViewer ∙ LogMeIn TeamViewer ∙ RDP ∙ LogMeIn

5.2 SOURCE: Check Point Software Technologies


APPLICATIONS: GETTING YOU WHERE IT HURTS | 44
Organizations experienced
12.7 high-risk application events
per hour, 305 times per day

Hide My Ass was nowhere to be seen. Likely, For instance, the Hola anonymizer app rose from
OpenVPN gained popularity following the Edward three percent to 17 percent. Part of its claim to fame
Snowden revelations about NSA eavesdropping. could be credited to being in the right place at the
The reason is that as an industry standard, right time. Hola emerged from beta testing just
OpenVPN uses crypto technology that cannot before the 2014 Sochi Olympics. Because it allows
be broken if implemented correctly, thus keeping internet access across borders, programming that
communications private. Meanwhile, other would be otherwise only available to people in a
anonymizers have climbed tremendously in specific geography is accessible for those using Hola
popularity, even if not yet one of the top three. to cloak their geolocations.

TOP REMOTE TOP P2P FILE TOP FILE STORAGE


ADMINISTRATION SHARING + AND SHARING APPLICATIONS
APPLICATIONS BITTORRENT
PROTOCOL
APPLICATIONS 2014 2013 2012
2014 85
84
78
2014
69
PERCENT OF ORGANIZATIONS

69
60

51
48
43

24 26
21 20 22
13 12 14 14 16 15 14 14 13
12 11 11 11 11 9
LO DP

N
ER

ES OA IN

RT -

UL T

XU K

IM I
ED SH

O L

IM D E
EV EY
JA UE

(Y OF X
E

)
EV NC

DE E
Y

(Y OF X
SE ICE

SU DE )
IM AR EY
EV NC
UE
LE

GA DIT

EN IT
PO IST

KE

LE
HI BO

O
N

I
EN C

EN U
VN
EI

BU
VE TA
M GO ADM

AG EL

G L
M ND
TA LIV PB

TA LIV PB
R

M FFI

OU FI
SE
EW

RE

EN

M EN

EN
AG SY

AG SY
N

OU F
GM

ON
UP SS

SU EN
OP

LI H

IM R
GH S RO

GH WS DRO
OR

G
VI

DR

S
Y
AM

IL E

IL E
SO

HI OW D
TT
Y
OT T
M

BI
TE

AM

S
W
DO

DO
D
RE

IN

IN

IN
HI
W

5.3 SOURCE: Check Point Software Technologies


APPLICATIONS: GETTING YOU WHERE IT HURTS | 45
MOST POPULAR USAGE OF ANONYMIZER
ANONYMIZER APPLICATIONS APPLICATIONS BY REGION

2014 2013 2012 2014 2013 2012

63 64
58 59
54 54
49 49
PERCENT OF ORGANIZATIONS

40
35
23 23
19
18
17 17 15 14
12 10 10
8 7

AMERICAS EMEA APAC


RA N
DN

PP OR

S
LA

TR OR

M F
OP SS

RA N
DN

TR OR

M F
OP ASS

N
R

DE UR
ER
CO VP

CO VP

VP
A
HO

HI ASU
T

T
LC

LC
LI
EN

EN

EN
S
Y

Y
A
OP

DE
SU

UL

UL

HI
Y
OX
PR

5.4 SOURCE: Check Point Software Technologies

For file storage and sharing, as well as peer to But the big news in high-risk applications can be
peer (P2P) sharing, the top applications noted last seen in the average number of events per hour and
year were more or less the same. The good news: per day. Check Point researchers studied 4,049,111
fewer occurrences of these in organizations. With events. Organizations experienced 12.7 high-risk
the major media coverage in the past year of leaked application events per hour, 305 times per day.
photos and private emails, no doubt this helped to Compare that to last year’s rate of 162 times per day
make many more aware and precautious. and you have an 88 percent increase.

APPLICATIONS: GETTING YOU WHERE IT HURTS | 46


RECOMMENDATIONS

While malware—both known and unknown—can needed to ensure productivity and innovation. Then,
sometimes seem beyond control, use of high- map out the individuals who should have access to
risk applications at least offers some semblance those programs. Monitor your network to ensure
of regulation. there are no rogue applications present.
3. Encrypt documents to prevent data loss. If a file
Here are four steps you can take to minimize the is forwarded to someone who should not see it,
dangers of these applications: encryption helps block the recipient from seeing
1. Educate your employees. Help people in your or opening the document.
organization understand the risks associated 4. Define and practice category-based application
with specific applications. Don’t assume they control. Help your administrators to help you.
know. Moreover, point them to more secure, IT- Empower them with the ability to block entire
supported tools that can address their business categories of applications as needed. This simplifies
and productivity needs. administration by extending policy control to new
2. Standardize on trusted, enterprise-grade applications as they are adopted.
applications. Identify the specific applications

“We live in a world where there are many risks,


and it’s high time we start taking seriously which
ones we should be worried about.” 25
-Lisa Randall, physicist

APPLICATIONS: GETTING YOU WHERE IT HURTS | 47


06
DATA LOSS:
LIKE SAND THROUGH
THE HOUR GLASS

“Mistakes are a fact of life. It is the response


to the error that counts.” 26
–Nikki Giovanni, poet, writer, educator, and activist

48 | INTRODUCTION AND METHODOLOGY CHECK POINT - 2015AND


INTRODUCTION SECURITY REPORT | 48
METHODOLOGY
Organizations suffered a
data loss at a rate of 1.7 times per hour,
41 times per day

Breaches aren’t the only way that the bad guys get knowing exactly the right phrasing to elicit a
the job done. Sometimes they need accomplices, response. In fact, some employers have started to
even if they’re unwitting ones. And that’s where social create phishing tests. Because internal error can
engineering and phishing come in. Cybercriminals be a major source of data leakage, companies are
have become so good at knowing the psychology sending spoof phishing emails to employees. If they
around their targets that their emails come across fall for it, it becomes a teachable moment.
as credible for even some who consider themselves
savvy. For instance, an employee gets an email from While the internal issue might not capture as much
someone who claims to be a recruiter and tells the media attention, it’s definitely something that should
individual about an open position. When the person be on the radar of any security-minded business. In
expresses interest, the so-called recruiter asks for 2014, 81 percent of organizations experienced at
more information about the company and possibly least one potential data loss incident. Drilling down,
other sensitive information. In other instances, an organization experiences 1.7 data loss events per
employees receive emails from people posing as hour, 41 times per day—a 41 percent increase over
co-workers and asking for sensitive information, last year.

DATA LOSS: LIKE SAND THROUGH THE HOUR GLASS | 49


DATA SENT OUTSIDE
THE ORGANIZATION BY EMPLOYEES
PERCENT OF ORGANIZATIONS

2014 2013 2012

PROPRIETARY
INFORMATION 41% 35% 24%

CREDIT CARD DATA 30% 29% 29%

BUSINESS DATA
RECORDS 20% 21% 6%

SENSITIVE PERSONAL
INFORMATION 25% 22%

SALARY INFORMATION 13% 14% 13%

NETWORK
INFORMATION 13% 14%

PASSWORD-
PROTECTED FILES 10% 10% 14%

CONFIDENTIAL
OUTLOOK MESSAGE 5% 5% 7%

BANK ACCOUNT
NUMBERS
5% 4% 3%

OTHER 27% 31% 21%

6.1 SOURCE: Check Point Software Technologies


DATA LOSS: LIKE SAND THROUGH THE HOUR GLASS | 50
Looking at the types of data that are stolen, ill-intentioned employee might include external
proprietary information leads the way, at 41 percent. recipients in the BCC field of a confidential email.
What’s remarkable is that it just keeps climbing. Since Interestingly, the percentage of companies that see
2012, we’ve seen almost a 71 percent increase. Credit this happening declined between 2012 and 2013,
card data was the second leading type of information but started to creep up again in 2014. On average,
leaked, though it’s remaining steady year to year. The companies experienced four data loss events per
biggest leap looking at the past three years of data, day as a result of an email going to several internal
regarding type of data lost, was with business data recipients and a single external one; when we looked
records, which was six percent in 2012 and is now at emails being sent with internal visible recipients
20 percent. How does it happen? In some cases, an (To and CC) and more than one external recipient in
employee might accidentally include someone from BCC field, we saw 15 data loss events per day.
outside the organization in a confidential email. For
instance, how many of us have started to type the But data also seeps out for other reasons: An
name of someone in the ‘To’ field, only to realize employee inadvertently makes private information
that the email client autocompletes with a different available online or a third-party vendor—perhaps a
recipient with a similar name? In other cases, an temp or contractor—steals the data.

Loss of proprietary information


has increased 71 percent over the
past three years

Every 36 minutes sensitive data is


sent outside the organization

DATA LOSS: LIKE SAND THROUGH THE HOUR GLASS | 51


WHERE IS ALL THIS LEADING?

Regardless of whether the data is getting out due And it is happening faster than you might imagine.
to external or internal engineering, the appetite for Within 30 minutes of leaving a department store,
that information is fed by one thing: financial gain. your credit card information could be “on sale” on
Cybercrime has not only become profitable; it has the black market.
become a big business. On the other side of the
mirror, the data swiped is not just being sold on the The fresher the theft of the data, the more money
black market, it’s being marketed. Websites post it fetches.

the credit cards that are available for purchase with


So who pays? In the United States, because of poor
relevant criteria—issuing bank, how “fresh” it is. It’s
retail security practices, judges have ruled that
not just quietly passed to one or two people in a dark retailers can be sued, allowing banks to recoup
alley. It’s broadcast, in broad daylight. their costs.

ELECTRONICS CARDING SERVICE


ELECTRONICS
ALL OVER CARDING
THE WORLD SERVICE
PROVIDE BULK CARDING SERVICES ALSO
ALL OVER THE WORLD
PROVIDE BULK CARDING SERVICES ALSO

FRESH WEEKLY UPDATES SNIFFED FROM POS


FRESH WEEKLY UPDATES SNIFFED FROM POS
United States, NY BANK OF AMERICA American Sanctions 1 +
411773 VISA DEBIT PLATINUM 10/17 Yes 101 52.5$
Rochester, 14623 N.A.
United States, NY BANK OF AMERICA American Sanctions 1 +
411773 VISA DEBIT PLATINUM 10/17 Yes 101 52.5$
Rochester, 14623 N.A.
United States, IA WELLS FARGO American Sanctions 1 +
432388 VISA DEBIT PLATINUM 05/15 Yes 101 52.5$
Bettendorf, 52722 N.A.
United States, IA WELLS FARGO American Sanctions 1 +
432388 VISA DEBIT PLATINUM 05/15 Yes 101 52.5$
Bettendorf, 52722 N.A.
United States, PA MEMBERS 1ST F.C.U. American Sanctions 1 +
414548 VISA DEBIT BUSINESS 05/16 Yes 101 52.5$
Hanover, 17331
United States, PA MEMBERS 1ST F.C.U. American Sanctions 1 +
414548 VISA DEBIT BUSINESS 05/16 Yes 101 52.5$
Hanover, 17331
United States, CO WELLS FARGO American Sanctions 1 +
486831 VISA DEBIT PLATINUM 04/17 Yes 101 52.5$
Littleton, 80129 N.A.
United States, CO WELLS FARGO American Sanctions 1 +
486831 VISA DEBIT PLATINUM 04/17 Yes 101 52.5$
Littleton, 80129 N.A.
United States, WI ITS BANK American Sanctions 1 +
448055 VISA DEBIT CLASSIC 01/16 Yes 101 22.5$
Green Bay, 54303
United States, WI ITS BANK American Sanctions 1 +
448055 VISA DEBIT CLASSIC 01/16 Yes 101 22.5$
Green Bay, 54303
United States, CA CAPITAL ONE BANK American Sanctions 1 +
414709 VISA CREDIT SIGNATURE 10/16 Yes 101 42.01$
Mission Viejo, 92692 (USA) N.A.
United States, CA CAPITAL ONE BANK American Sanctions 1 +
414709 VISA CREDIT SIGNATURE 10/16 Yes 101 42.01$
Mission Viejo, 92692 (USA) N.A.

DATA LOSS: LIKE SAND THROUGH THE HOUR GLASS | 52


ORGANIZATIONS WITH AT LEAST ONE POTENTIAL DATA LOSS EVENT, BY INDUSTRY
2014 2013 2012

88 86 88 87
82
PERCENT OF ORGANIZATIONS

78 78 79
70

61

50
45

MANUFACTURING FINANCE GOVERNMENT TELCO

6.2 SOURCE: Check Point Software Technologies

EASY MONEY

Like hunters looking for easy prey, cybercriminals other countries. Chip and PIN is a global standard of
have zeroed in on point of sale (PoS) as their hunting payment that embeds an integrated circuit (IC) chip
ground. The main reason: So many PoS terminals are into the card and can only be authorized when used
running outdated operating systems like Windows with a PIN. As part of this standard, retailers will need
XP, which end up going unpatched and unmanaged. to update their PoS systems to ensure compatibility.
If you were tuned into the media during the past year, But even with chip and PIN, retailers will still
it would have seemed like one major retailer after need to stay one step ahead. Infections like the
another was getting hit with security breaches. “BackOff” malware, which impacted a large number
of U.S. businesses, highlighted a large security
The year started with a bang when Neiman Marcus vulnerability: The malware pre-installed tools in the
was breached and lost 1.1 million account records, supply lines of seven major manufacturers of PoS
only to be outdone that same month by hobby store terminals before being shipped to merchants. Weak
Michaels, which lost three million. As the year or unchanged admin passwords allowed hackers
continued, taxis, beauty stores, Goodwill, UPS, and remote access into devices.
Dairy Queen followed. In September, Home Depot
topped them all with 56 million. All of this adds up The Department of Homeland Security reports that
to 112,250,000 lost records within the United States, more than 1,000 United States businesses were hit
affecting one in three Americans. by PoS malware,27 taking a huge toll on businesses
and individuals. In fact, card replacement cost alone
PoS malware infections certainly occur throughout added up to $1.3 billion. A LexisNexis study called The
the world, but the United States leads the way with True Cost of Fraud 28 says that the average merchant
the most infections, in part because it is not yet on suffered 133 successful fraudulent transactions per
the chip and PIN credit card system being used in month in 2014, up 46 percent from the previous year.

DATA LOSS: LIKE SAND THROUGH THE HOUR GLASS | 53


PoS: You Can’t Have Just One Chip

During 2013 and 2014, the retail industry breaches shows that chip and PIN would not
experienced an alarming number of data and have prevented these incidents.
security breaches. These attacks resulted in
the loss of millions of customer credit cards The attackers targeting the retail stores used
and personal information. The companies available remote connections to access store
involved experienced negative financial networks and installed multiple variants
effects from the event, with the largest of malware and software tools to capture
retailer experiencing a 13% drop in its market and export customer data. Shortcomings in
valuation and a reduction in comparable-store store network design and point of sale (PoS)
sales. These breaches impact companies large configuration further enabled the attacks
and small. Between 2013 and 2014, notable by simplifying horizontal movement and
names like Michaels, Neiman Marcus, PF malware infestation.
Chang’s, Target and Home Depot have all
suffered staggering losses from PoS-related To secure against these types of attacks, take
data breaches. a broader view and implement a multi-layered
approach that addresses the entire network—
Customer concerns over privacy and financial not just the parts believed to be most vulnerable.
security are shaken, and corporate boards
are actively looking for structural changes.
The short-term effects are just now coming
to light. The long-term impact will only be
known in the coming years.

In responding to these types of incidents,


companies often pursue knee-jerk reaction
tactics. For example, they will focus on
the most obvious weakness or choose a
method that appears most prominently
in the news.

In the case of the recent retail data breaches,


much emphasis has been placed on a move
to “chip and PIN” credit cards—a global
standard of payment that employs two-factor
authentication through a physical chip on a card
that is tied to a user’s personal identification
number (PIN). But, a cursory review of the
attack methods associated with the retail

DATA LOSS: LIKE SAND THROUGH THE HOUR GLASS | 54


RECOMMENDATIONS

Remember that security does not stand still. When it’s encrypted, only individuals who are authorized
you balance your body, there are lots of subtle to view the information will be able to see it.
movements at play that keep you standing. The • Creating layers of protection with checks
same goes with how you need to think through your and balances.
security. To stay ahead of the threats, you need to be • Helping everyone—from top down—understand
constantly assessing and updating as you go. Don’t the importance of mitigating cyber-related risks to
stop with just making sure you’re protected from protect intellectual property.
outside attack; make sure you’re covered internally, • Involving your workforce in improving your
as well. Specifically, we recommend: information security posture by educating them
• Protecting your data by encrypting it—whether it’s on how they can help. Create information security
at rest or in transit. The goal is to provide a cloak policies that employees can understand and
of protection for the data, wherever it goes. When help reinforce.

“It is better to look ahead and prepare


than to look back and regret.” 29
-Jackie Joyner Kersee, athlete and olympic medalist

DATA LOSS: LIKE SAND THROUGH THE HOUR GLASS | 55


07
CONCLUSION AND
RECOMMENDATIONS:
THE PATH TO PROTECTION

“Status quo, you know, is Latin


for ‘the mess we’re in’.” 30
–Ronald Reagan, actor and former President of the United States

56 | INTRODUCTION AND METHODOLOGY CHECK POINT - 2015AND


INTRODUCTION SECURITY REPORT | 56
METHODOLOGY
“The Cold War didn’t end in the 1990s.
It simply moved online.” 31
-Jose Pagliery, journalist

It’s clear that cybercriminals are not slowing down. and corporate policy—and tie to procedures and
In fact, based on how bad 2014 was, from a cyber requirements, performance measurements, and of
security perspective, analysts expect the security course, people at all levels of the organization.
industry to grow tenfold.
Map out your process and make sure it includes
Threats can come from any direction and it has even the most basic steps, such as applying
become impossible to say that any one organization software patches and updates. Also think about
is safe from attack. In fact, the biggest mistake your ecosystem of partners and how they tie to the
any organization can make is to believe it is security process.
protected, and neglect to revisit its security
infrastructure regularly. When it comes to technology, your security program
must unify multiple layers and controls.
When thinking through your security posture,
take the time to truly understand your threats and Given that threats are coming from multiple places,
vulnerabilities. Look for contributing factors, and single-layer security architectures and multi-vendor
also look at the big picture of where you’re trying point solutions are no longer adequate.
to lead your organization. The most prepared
businesses know that security policy needs to Start with thinking about your architecture as three
stem from strategic goals, business objectives, interconnected levels.

CONCLUSION AND RECOMMENDATIONS: THE PATH TO PROTECTION | 57


A software-defined protection architecture based on Check Point recommends threat prevention
a three-layer security approach is the best defense that includes:
against fast-evolving attacks. • Deep OS- and CPU-level sandbox capabilities
to detect and block malware
Enforcement Layer • Threat extraction to reconstruct incoming
Create a gateway- and endpoint-based protection documents with zero malware in zero seconds
plan that scans, identifies and blocks malware,
botnets and weaponized content that is designed to This approach looks for malicious activities at the
collect and exfiltrate customer information. Assign OS level and exploits at the CPU level, preventing
network- and application-access authentication attacks before they occur. Detecting exploit attempts
rules to prohibit unauthorized users and systems during the pre-infection stage helps you avoid
from accessing sensitive areas of the network. evasion techniques.

Control Layer When you combine OS- and CPU-level sandboxing


Establish administrator-determined security with threat extraction, you have a next-generation
policies and automated protections. Create rules technology that delivers the best possible catch rate
that specifically define access control and data for threats.
security policies with enforcement points. Restrict
applications and system behavior according to ‘least Management Layer
privilege’ guidelines. Monitor all business-aligned administrator privileges
and create comprehensive reporting. Implement
As you look to specific solutions, consider those intelligence-based threat prevention that updates
that allow you to (1) investigate any incoming independently and proactively distributes new
file types, including secure and encrypted files; protections to enforcement points. Not keeping up
(2) identify zero-day threats both within and to date is one of the huge vulnerabilities in most
beyond the operating system; and (3) deliver safe networks. Implement event management, logging
documents with zero malware in zero seconds. and reporting tools that identify events in real-time
The best protection is a combination of the fastest and include filtering and analysis tools to ensure
operating solution that offers the top catch administrators have visibility into attacks without
rate and protects your business from attack. getting lost in less critical noise.

WHAT NEXT?

As mobile devices become, increasingly, primary developers do not scan their apps for vulnerabilities
devices, we expect hackers to look to them as before releasing them.32 Given this reality, and after
their new attack vectors. What’s more, according reviewing what has come from the past year, we
to the Ponemon Institute, 40 percent of mobile app see 2015 as the year to define your mobile security

CONCLUSION AND RECOMMENDATIONS: THE PATH TO PROTECTION | 58


and take a more aggressive stance with your Ultimately, with all that connectivity, we can expect
security posture. That becomes especially important more vulnerabilities, more threats. At Check Point,
as the growth of mobile payment systems starts our mission is clear: We secure the future. Similarly,
to accelerate. organizations must also be future-minded. Being
clear about long-term objectives and how to optimize
While some solutions like Apple Pay, Google Wallet the security infrastructure to support your vision
and PayPal offer multiple layers of security involving is essential.
tokenization and encryption, not all of these systems
have been thoroughly tested to withstand real- By understanding potential threats and
world threats. It’s a safe bet that attackers will be vulnerabilities; creating a solid plan that aligns
searching out vulnerabilities to exploit. with your business; and ensuring protections are
integrated into your IT infrastructure, you can turn
Add to that, ABI Research estimates that the security into an enabler. And in doing so, you’re able
number of wearable computing device shipments to unlock innovation and foster an environment for
will reach 485 million units by 2018. 33
Analyst high performance and productivity.
firm Gartner believes that 4.9 billion things will
be in use in 2015, up 30 percent from last year. Of If you’d like to get a true assessment of your
that, the firm expects manufacturing, utilities and company’s security, sign up for a free Check
transportation industries will see the most use Point Security Check Up at www.checkpoint.com/
from the Internet of Things (IoT)— with 736 million resources/securitycheckup. Or, to learn more
combined connected things. By 2020, it expects to about Check Point and how we can help secure
see 25 billion connected things. 34
your business, please visit www.checkpoint.com.

“The riskiest thing we can do is just


maintain the status quo.” 35
-Bob Iger, businessman, chairman/CEO of Walt Disney Company

CONCLUSION AND RECOMMENDATIONS: THE PATH TO PROTECTION | 59


REFERENCES

1 Stoll, Cliff. “The Call to Learn.” TED Talk. February 2006.


2 Obama, Barack. The Cybersecurity and Consumer Protection Summit. February 13, 2015.
3 Check Point Software Technologies. http://www.checkpoint.com/resources/securitycheckup/
4 AV-Test. http://www.av-test.org/en/statistics/malware/
5 Lacy, Sarah. “The Irony of the Social Media Era: It Was Created By the World’s Least Social People.”
Huffington Post, July 15, 2012. http://www.huffingtonpost.com/sarah-lacy/social-media-entrepreneurs-
mark-zuckerberg_b_1518471.html
6 Amira, Dan. “Q&A With Nate Silver on His New Book, Whether Romney Has a Shot, and Why He
Doesn’t Play Fantasy Baseball Anymore.” New York Magazine, September 28, 2012.
http://nymag.com/daily/intelligencer/2012/09/nate-silver-book-signal-noise-interview.html
7 Check Point Software Technologies. “The Unknown 300 Test Report,” 2014.
https://www.checkpoint.com/downloads/300TestReport.pdf
8 Saint-Exupery, Antoine de. Wind, Sand and Stars, 1939.
9 Pareles, Jon. “Madonna on ‘Rebel Heart,’ Her Fall and More.” The New York Times, March 5, 2015.
http://nyti.ms/1A29332
10 Spamhaus. “The Spamhaus Project.” http://www.spamhaus.org/news/article/720/spamhaus-botnet-
summary-2014
11 Ward, Jillian. “Power Network Under Cyber-Attack Sees U.K. Increase Defenses,” Bloomberg Business,

January 8, 2015. http://www.bloomberg.com/news/articles/2015-01-09/power-grid-under-cyber-attack-


every-minute-sees-u-k-up-defenses
12 Prince, Brian. “Almost 70 Percent of Critical Infrastructure Companies Breached in Last 12 Months:

Survey,” SecurityWeek, July 14, 2014. http://www.securityweek.com/almost-70-percent-critical-


infrastructure-companies-breached-last-12-months-survey
13 CVE Details. http://www.cvedetails.com/browse-by-date.php; http://www.cvedetails.com/top-50-

vendors.php?year=2014
14 Kirk, Jeremy. “An SDN vulnerability forced OpenDaylight to focus on security,” CSO, March 25, 2015.

http://www.csoonline.com/article/2902902/vulnerabilities/an-sdn-vulnerability-forced-opendaylight-
to-focus-on-security.html
15 Reilly, Claire and Musil, Steven. CNET, September 24, 2014.

http://www.cnet.com/news/bigger-than-heartbleed-bash-bug-could-leave-it-systems-shellshocked/
16 Gilbert, David. “What is POODLE? The Latest Online Security Threat After Shellshock and Heartbleed,”

International Business Times, October 16, 2014. http://www.ibtimes.co.uk/what-poodle-latest-online-


security-threat-after-shellshock-heartbleed-1470300

REFERENCES | 60
17 Singh, Anita. “Hay Festival 2012: Salman Rushdie on security and The Satanic Verses,” The Telegraph,

June 3, 2012. http://www.telegraph.co.uk/culture/hay-festival/9309641/Hay-Festival-2012-Salman-


Rushdie-on-security-and-The-Satanic-Verses.html
18 Pinter, Harold. The Homecoming, 1965.

19 Lunden, Ingrid. “Led By iPhone 6, Apple Passed Samsung In Q4 Smartphone Sales, 1.9B Mobiles Sold

Overall In 2014” TechCrunch, March 3, 2015. http://techcrunch.com/2015/03/03/led-by-iphone-6-apple-


passed-samsung-in-q4-smartphone-sales-1-9b-mobiles-sold-overall-in-2014/#.w6n4vv:a9vl
20 Gartner. January 5, 2015. http://www.gartner.com/newsroom/id/2954317

21 Taft, Darryl K. “IBM Study Shows Mobile App Developers Neglecting Security,” eWeek, March 21, 2015.

http://www.eweek.com/developer/ibm-study-shows-mobile-app-developers-neglecting-security.html
22 Schroeder, Stan. “Android Malware Spies on You Even After Phone Is Shut Down,” Mashable,

February 19, 2015. http://mashable.com/2015/02/19/android-malware-spies-shut-down/


23 Schawbel, Dan. “Eric Schmidt and Jonathan Rosenberg: What We Can Learn From Google,” Forbes,

September 23, 2014. http://www.forbes.com/sites/danschawbel/2014/09/23/eric-schmidt-and-


jonathan-rosenberg-what-we-can-learn-from-google/
24 Battelle, John. “Thoughts on Ford’s OpenXC: In the Future, Brands with Open Data Will Win,”

August 18, 2013. http://battellemedia.com/archives/2013/08/thoughts-on-fords-openxc-in-the-future-


brands-with-open-data-will-win.php
25 Irion, Robert. “Opening Strange Portals in Physics,” Smithsonian Magazine, December 2011.

http://teachers.smithsonian.com/science-nature/opening-strange-portals-in-physics-92901090/?all
26 Giovanni, Nikki. Black Feeling, Black Talk, Black Judgment, 1970.

27 United States Computer Emergency Readiness Team. US-CERT, August 27, 2014.

https://www.us-cert.gov/ncas/alerts/TA14-212A
28 LexisNexis. “2014 LexisNexis® True Cost of FraudSM Study.”

http://www.lexisnexis.com/risk/downloads/assets/true-cost-fraud-2014.pdf
29 Schwartz, Larry. “Joyner Kersee Completes Huge Leap,” ESPN.com.

https://espn.go.com/sportscentury/features/00016055.html
30 Reagan, Ronald. “Address Before a Joint Session of the Tennessee State Legislature in Nashville,”

March 15, 1982. http://www.presidency.ucsb.edu/ws/?pid=42270


31 Pagliery, Jose. “Russia Attacks U.S. Oil and Gas Companies in Massive Hack,”CNN Money, July 2, 2014.

http://money.cnn.com/2014/07/02/technology/security/russian-hackers/

REFERENCES | 61
32 Vijayan, Jai. “Rush To Release Resulting In Vulnerable Mobile Apps,” Dark Reading, March 20, 2015.

http://www.darkreading.com/attacks-breaches/rush-to-release-resulting-in-vulnerable-mobile-
apps/d/d-id/1319566
33 ABI Research. “Wearable Computing Devices, Like Apple’s iWatch, Will Exceed 485 Million Annual

Shipments by 2018,” ABIResearch.com, February 21, 2013.


https://www.abiresearch.com/press/wearable-computing-devices-like-apples-iwatch-will/
34 Moore, Michael. “Internet Of Things To Hit 4.9 Billion Things By 2015,” TechWeekEurope, November 11,

2014. http://www.techweekeurope.co.uk/e-innovation/internet-of-things-4-9bn-gartner-155298
35 Iger, Bob. Disney Shareholder Meeting, Anaheim, NBC News, March 3, 2006.

http://www.nbcnews.com/id/11767409/ns/business-us_business/t/pixars-star-disney-
shareholders-meeting/#.VSRlovnF9Zt

REFERENCES | 62
We Secure the Future

Worldwide Headquarters
5 Ha’Solelim Street, Tel Aviv 67897, Israel
Tel: 972-3-753-4555 | Fax: 972-3-624-1100
Email: [email protected]

U.S. Headquarters
959 Skyway Road, Suite 300, San Carlos, CA 94070
Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233

www.checkpoint.com

You might also like